Web services allow the communication of heterogeneous systems on the Web. These facilities make them particularly suitable for deploying in the cloud. Although research on formalization and verification has improved trust in Web services, issues such as high availability and security are not fully addressed. In addition, Web services deployed in cloud infrastructures inherit their vulnerabilities. Because of this limitation, they may be unable to perform their tasks perfectly. In this thesis, we claim that a good tolerance requires attack detection and continuous monitoring on the one hand; and reliable reaction mechanisms on the other hand. We therefore proposed a new formal monitoring methodology that takes into account the risks that our...
Multimedia and interactive applications play an increasingly important role in networks and are gene...
The evolution of telecommunications has led today to a proliferation of connected devices and a mass...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
The cloud computing business model introduced a new paradigm in terms of ownership of a system. Befo...
In traditional environments, attack graphs can paint a picture of the security exposure of the envir...
Sterilization services are vulnerable to risks, due to the contagious nature of their environment an...
Cloud computing has evolved over the last decade from a simple storage service for more complex serv...
Today, Cloud Networking is one of the recent research areas within the Cloud Computing research comm...
Dynamic resource management has become an active area of research in the Cloud Computing paradigm. C...
Presented in the literature as a new technology, Cloud Computing has become essential in the develop...
Today, production systems are facing their 4th revolution. This revolution is digital with increasin...
The network ecosystem has tremendously changed in the past years and is becoming more complex as dev...
People now live within an electronic sphere of heterogenous devices providing similar services. From...
The popularity of web service raises a lot of problems related to its performance. The use of "intel...
Even if the concept of decentralization is embedded to some extent at the very core of the Internet,...
Multimedia and interactive applications play an increasingly important role in networks and are gene...
The evolution of telecommunications has led today to a proliferation of connected devices and a mass...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...
The cloud computing business model introduced a new paradigm in terms of ownership of a system. Befo...
In traditional environments, attack graphs can paint a picture of the security exposure of the envir...
Sterilization services are vulnerable to risks, due to the contagious nature of their environment an...
Cloud computing has evolved over the last decade from a simple storage service for more complex serv...
Today, Cloud Networking is one of the recent research areas within the Cloud Computing research comm...
Dynamic resource management has become an active area of research in the Cloud Computing paradigm. C...
Presented in the literature as a new technology, Cloud Computing has become essential in the develop...
Today, production systems are facing their 4th revolution. This revolution is digital with increasin...
The network ecosystem has tremendously changed in the past years and is becoming more complex as dev...
People now live within an electronic sphere of heterogenous devices providing similar services. From...
The popularity of web service raises a lot of problems related to its performance. The use of "intel...
Even if the concept of decentralization is embedded to some extent at the very core of the Internet,...
Multimedia and interactive applications play an increasingly important role in networks and are gene...
The evolution of telecommunications has led today to a proliferation of connected devices and a mass...
: Since the 1990s, side channel attacks have challenged the security level of cryptographic algorith...